IT Security

2021 State of the Phish
There's no question that organisations (and individuals) faced many challenges in 2020, both new and...

NoSQL for Dummies
This easy to read guide to NoSQL databases provides the type of no–nonsense overview and analysis that...

32 Security Experts on Changing Endpoint Security
For many companies, the modern business environment has become a mobile workplace in which employees...

The 7 Hidden Truths of Cloud Security
Based on extensive, up-to-date knowledge and experience from WithSecure consultants, threat hunters and...

Best Practice Makes Perfect: Malware Response in The New Normal
Before Covid-19, cyber security teams already confessed to being overworked – as high-profile security...

The Case for Secure Communications
The tapping of voice communications has occurred virtually as long as electronic communication has been...

Pure Storage FlashBlade: Unified Fast File and Object (UFFO) Platform
Operational efficiency is the most-cited objective for digital transformation according to ESG research....

The Mimecast-Netskope-CrowdStrike Triple Play
Security and IT organizations must protect against new attacks at scale — and safeguard data in use,...

The 4 Benefits of VPN Elimination
The corporate perimeter as you know it no longer exists. Virtual private network (VPN) vulnerabilities...

Report: ICS/OT Cybersecurity 2021 Year in Review
Dragos is excited to present the fifth year of the annual Dragos Year In Review report on Industrial...

The Solarwinds Tipping Point
In December 2020, hackers had broken into several federal government computer networks and the attack...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.